Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

VirTool:Win32/DelfInject.gen!AC aliases:

Name Vendor Dr.Web classification name
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.23265
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.3130
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.5925
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.Proxy.3199
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.Proxy.3198
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.Proxy.3083
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.Inject.5089
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.Proxy.3012
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.13770
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.WMSteal
VirTool:Win32/DelfInject.gen!AC Microsoft BackDoor.IRC.Sdbot.3660
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.18458
VirTool:Win32/DelfInject.gen!AC Microsoft BackDoor.IRC.Sdbot.3277
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.PWS.LDPinch.1911
VirTool:Win32/DelfInject.gen!AC Microsoft Win32.HLLW.MyBot.based
VirTool:Win32/DelfInject.gen!AC Microsoft BackDoor.Bifrost.998
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.Inject.485
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.15597
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.Inject.5733
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.PWS.Panda.109
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.Packed.139
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.PWS.Panda.16
VirTool:Win32/DelfInject.gen!AC Microsoft Win32.HLLW.Autoruner.6733
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.3949
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.PWS.Panda.9
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.19636
VirTool:Win32/DelfInject.gen!AC Microsoft Win32.Virut.9156
VirTool:Win32/DelfInject.gen!AC Microsoft Win32.HLLW.Autoruner.2077
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.Warring
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.20924
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.23420
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.Inject.4092
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.18457
VirTool:Win32/DelfInject.gen!AC Microsoft BackDoor.Poison.198
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.20712
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.27875
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.Inject.3866
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.StartPage.22132
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.PWS.Sable
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.4116
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.28262
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.28026
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.Packed.339
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop.15011
VirTool:Win32/DelfInject.gen!AC Microsoft BackDoor.Poison.686
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop1.4676
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop1.4690
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.MulDrop1.4884
VirTool:Win32/DelfInject.gen!AC Microsoft Trojan.DownLoader.63572
VirTool:Win32/DelfInject.gen!AC Microsoft Win32.HLLM.Netsky.18353

1 2 3 4 5 6 7 8

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.